Friday, April 28, 2017

DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES

Saad Alsunbul1,2, Phu Dung Le1 and Jefferson Tan1
1Caulfield School of Information Technology, Monash University, Melbourne,Australia
2Computer Research Institute, King Abdullaziz for Science and Technology, Riyadh,Saudi Arabia


ABSTRACT
Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reason behind that, there is a few researches that examine the behavior of hackers. This paper formally and practically examines in details the behavior of hackers and their targeted environments. Moreover, this paper formally examines the properties of one essential pre-hacking step called scanning and highlights its importance in developing hacking strategies. Also, it illustrates the properties of hacking that is common in most hacking strategies to assist security experts and researchers towards minimizing the risk of hack.

KEYWORDS
Hacking, network security, security properties, pre-hacking, scanning, necessary information

                                                                 More Details 

Wednesday, April 26, 2017

ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH AND MARKOV MODEL


International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html


Volume 08, Number 05 - September  2016

Article - ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH AND MARKOV MODEL

ABSTRACT

 RFID systems are one of the important techniques that have been used in modern technologies; these systems rely heavily on default and random passwords. Due to the increasing use of RFID in various industries, security and privacy issues should be addressed carefully as there is no efficient way to achieve security in this technology. Some active tags are low cost and basic tags cannot use standard cryptographic operations where the uses of such techniques increase the cost of these cards. This paper sheds light on the weaknesses of RFID system and identifies the threats and countermeasures of possible attacks. For the sake of this paper, an algorithm was designed to ensure and measure the strength of passwords used in the authentication process between tag and reader to enhance security in their communication and defend against brute-force attacks. Our algorithm is design by modern techniques based on entropy, password length, cardinality, Markov-model and Fuzzy Logic.  

 











Tuesday, April 25, 2017

A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DDOS ATTACKS

International Journal of Network Security & Its Applications (IJNSA)


ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html


Volume 08, Number 05 - September  2016


Article -    A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED                           DETECTION AGAINST DDOS ATTACKS

Authors -  Chin-Ling Chen1 and Hsin-Chiao Chen2

                1Department of Information Management, National Pingtung University, Pingtung,
                 Taiwan, 900
               2Department of Information Management, National Pingtung Institute of Commerce,                           Pingtung, Taiwan, 900


ABSTRACT

We have designed a hybrid approach combining rule-based and anomaly-based detection against DDoS attacks. In the approach, the rule-based detection has established a set of rules and the anomaly-based detection use one-way ANOVA test to detect possible attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and monitor the system resource of the victim like throughput, memory utilization, CPU utilization consumed by attack traffic. Target users of the proposed scheme are data center administrators. The types of attack traffic have been analysed and by that we develop a defense scheme. The experiment has demonstrated that the proposed scheme can effectively detect the attack traffic.

 KEYWORDS

 Distributed denial of service, firewall, detection




Monday, April 24, 2017

A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION IN COMPUTER NETWORK

International Journal of Network Security & Its Applications (IJNSA)


ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)



Volume 07, Number 06 - November 2015


Article -    A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for                      Intrusion Detection in Computer Network.

Authors -  Yuchen Wang and Qiongfang Huang, Zhejiang University of Technology, China Shuxiang                    Xu, University of Tasmania, Australia


Abstract :

               Building practical and efficient intrusion detection systems in computer network is important in industrial areas today and machine learning technique provides a set of effective algorithms to detect network intrusion. To find out appropriate algorithms for building such kinds of systems, it is necessary to evaluate various types of machine learning algorithms based on specific criteria. In this paper, we propose a novel evaluation formula which incorporates 6 indexes into our comprehensive measurement, including precision, recall, root mean square error, training time, sample complexity and practicability, in order to find algorithms which have high detection rate, low training time, need less training samples and are easy to use like constructing, understanding and analyzing models. Detailed evaluation process is designed to get all necessary assessment indicators and 6 kinds of machine learning algorithms are evaluated.Experimental results illustrate that Logistic Regression shows the best overall performance. 


A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)

Abdelmunem Abuhasan1 and Adwan Yasin2 
1Department of Computer Science, Arab American University, Jenin, Palestine 
2Department of Computer Science, Arab American University, Jenin, Palestine

ABSTRACT

Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.

 KEYWORDS

 Web Authentication, Mobile Authentication, phishing, User Identity, Password

Friday, April 21, 2017

A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE

Nguyen Hong Son 
Department of Information and Communication Technology,
 Post and Telecommunication Institute of Technology, Ho Chi Minh City, Viet Nam 

ABSTRACT

 When service system is under DDoS attacks, it is important to detect anomaly signature at starting time of attack for timely applying prevention solutions. However, early DDoS detection is difficult task because the velocity of DDoS attacks is very high. This paper proposes a DDoS attack detection method by modeling service system as M/G/R PS queue and calculating monitoring parameters based on the model in odder to early detect symptom of DDoS attacks. The proposed method is validated by experimental system and it gives good results.

 KEYWORDS

DDoS, Detection, M/G/R Processor Sharing queue

Thursday, April 20, 2017

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE

Jawaher alqahtani, Daniyal Alghazzawi 1 and Li Cheng 2 
 1Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia
 2Xinjiang Technical Institute of Physics & Chemistry, Chinese Academy of Sciences, China 

ABSTRACT

 Embedding a message in media files, also known as steganography, is a common approach to hide secret information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.

 KEYWORDS

Steganography, Steganalysis, Artificial Intelligence, fuzzy logic.

Wednesday, April 19, 2017

A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS

Waleed Al Shehri 
Department of Computer Science, King Abdul-Aziz University, Jeddah, Saudi Arabia

 ABSTRACT

The emergence of wireless sensor networks (WSNs) can be considered one of the most important revolutions in the field of information and communications technology (ICT). Recently, there has been a dramatic increase in the use of WSN applications such as surveillance systems, battleground applications, object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in such applications. As a result, many solutions and approaches have been proposed for different attacks and vulnerabilities to achieve security requirements. This paper surveys different security approaches for WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths and weaknesses for each technique are also discussed at the conclusion of this paper. 

KEYWORDS

 Wireless sensor networks; network security; cryptography; intrusion detection;


Tuesday, April 18, 2017

Application-Layer DDOS Detection Based on a One-Class Support Vector Machine

International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Article Title : Application-Layer DDOS Detection Based on a One-Class Support Vector Machine

for more please visit : http://aircconline.com/ijnsa/V9N1/9117ijnsa02.pdf

You may also view this in - https://www.youtube.com/watch?v=O4NS7vG7cUU&feature=youtu.be

Saturday, April 15, 2017

A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM




Authors

Jae Pil Lee1 and Jae Gwang Lee2 and Jun hyeon Lee3 Ki-su Yoon4 and Jae Kwang Lee5 

12345Department of Computer Engineering, Han Nam University, Dae-jeon City, Korea

ABSTRACT

The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.  

KEYWORDS 

Disaster, notification, Beacon, Security, Smartphone, LEA, SEED

                                                       More Details 








Thursday, April 13, 2017

A SECURE E- MEDICAL EXEMPTION SYSTEM (E-MES): JORDAN CASE


Authors

Heba N. Kamel, Mohammad A. Alia, Bara’aha. Al Saeq, Eman Abu Maria

Faculty of Science and Information Technology – Al Zaytoonah University of Jordan, 
Amman, Jordan 

ABSTRACT

In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the proposed system is summarized into three phases: first, the hospital process for applying the patient's application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which receives the hospital report, will then send a request to the ministry of health, the income and sales tax department, and the ministry of social development in order to check the patient's condition for a medical exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment. Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system is more efficient than the traditional medical protocols since the patient can apply for a medical exemption directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key encryption and digital signature system ensures and guarantees the security of the proposed protocol. Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.

KEYWORDS

 Cryptography, Information security, medical system, and exemption.

Wednesday, April 12, 2017

METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: A QUANTITATIVE APPROACH BASED ON COMPONENT DEPENDENCY

Suhail Qadir Mir1 and S.M.K. Quadri2 
1 Post Graduate Department of computer sciences, University of Kashmir, India 2Department of Computer Science, Jamia Millia Islamia, India

 ABSTRACT

 The purpose of the paper is to present a metric for availability based on the design of the information system. The availability metric proposed in this paper is twofold, based on the operating program and network delay metric of the information system (For the local bound component composition the availability metric is purely based on the software/operating program, for the remote bound component composition the metric incorporates the delay metric of the network). The aim of the paper is to present a quantitative availability metric derived from the component composition of an Information System, based on the dependencies among the individual measurable components of the system. The metric is used for measuring and evaluating availability of an information system from the security perspective, the measurements may be done during the design phase or may also be done after the system is fully functional. The work in the paper provides a platform for further research regarding the quantitative security metric (based on the components of an information system i.e. user, hardware, operating program and the network.) for an information system that addresses all the attributes of information and network security.

 KEYWORDS 

Availability, Metric, Security, Dependency, Information System

More Details...

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...